Abstract. We introduce a novel remotely-mounted attack that can expose the network identity of an anonymous client, hidden service, and anonymizing proxies. To achieve this, we emp...
We present a new approach for evaluating a protein’s simulated trajectory via time-based haptic feedback. Molecular-scale trajectories are highly dynamic and thus pose new deman...
This paper presents a case study concerning the challenges and requirements posed by next generation language resources, realized as an overall model of open, distributed and coll...
Federico Calzolari, Eva Sassolini, Manuela Sassi, ...
Most modern safety-critical control programs, such as those embedded in fly-by-wire control systems, perform a lot of floating-point computations. The well-known pitfalls of IEEE...
David Delmas, Eric Goubault, Sylvie Putot, Jean So...
The design of tools for creative activities affects the creative processes and output of users. In this paper we consider how an understanding of creative interaction can inform t...